[SGVLUG] ATT's 2wire products are braindead

Claude Felizardo cafelizardo at gmail.com
Thu Aug 1 21:01:14 PDT 2013


I think Rae meant -v -v  or -vv (that's two lower case v's).  It will show
you the various steps ssh will go through as it negotiates the connection
-- protocols, pwd, keys, etc.  But if you are getting an out right drop,
it's not even getting that far.

Matt, have you tried disabling your custom filter?  Also, what if you used
a non standard port in case the router they are supplying is intentionally
blocking port 22.

Claude


On Thu, Aug 1, 2013 at 7:59 PM, Matthew Campbell <dvdmatt at gmail.com> wrote:

> Hi Rae,
>
> -w seems to be for specifying a tun device.  -v allows more debugging of
> the connection process.  Did you mean -v?
>
> Matt
>
> ---------
> *Matthew Campbell*
> Storage Solution Consultant
> Storage Design and Engineering
>
> *Kaiser Permanente*
> IMG-Systems Integration
> 99 S. Oakland
> Pasadena, CA 91101
>
> 626-564-7228 (office)
> 8-338-7228 (tie-line)
> 818-314-9897 (mobile phone)
> Green Center 3-North, 031W29
> ---------
> *kp.org/thrive*
>
>
> On Mon, Jul 29, 2013 at 5:36 PM, Rae Yip <rae.yip at gmail.com> wrote:
>
>> Double-check that your ssh client isn't attempting to use IPv6 or
>> something. (Note the ipprot=6 in your logs)
>>
>> Also, ssh -vv is often helpful.
>>
>> -Rae.
>> On Jul 29, 2013 4:48 PM, "Lakestake Rocketry" <lakestake at gmail.com>
>> wrote:
>>
>>> Good afternoon,
>>>
>>> I am trying to get SSH through my firewall at home.  I have set up a
>>> port redirect to senge, but I get a timeout when I connect to the port with
>>> ssh.  The following messages appear in the firewall log.  It looks like the
>>> first packet is being passed through, then following packets are being
>>> blocked...  Any ideas?  All Google gives me is a long list of people with
>>> similar problems.
>>>
>>> Matthew Campbell
>>>
>>>
>>> ---------- Forwarded message ----------
>>> INF 2013-07-26T20:15:42-07:00 fw src=162.200.153.165 dst=172.28.1.2
>>> ipprot=6 sport=40058 dport=22 Session Matches User Pinhole, Packet Passed
>>> INF 2013-07-26T20:15:42-07:00 fw src=162.200.153.165 dst=172.28.1.2
>>> ipprot=6 sport=40058 dport=22 Drop traffic to 172.16.0.0/12
>>>
>>>
>>>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://sgvlug.net/pipermail/sgvlug/attachments/20130801/2c604195/attachment.html>


More information about the SGVLUG mailing list